Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe
-
Size
313KB
-
MD5
5699ef3cee94fdb8bcb6d7b7d44c1759
-
SHA1
639f1c47ee077d96dd21e9301dfc1500aeb6c6be
-
SHA256
606149c27f6f76e48ee57bcd3259ca0d4960de3157e18b989892bf8bf7090d9a
-
SHA512
28f60f78109942e16ff535ce50bbe1f98d21a80826b201ba9981158a0f6c9e31eb7e01d5be324170dbe9e777c3a34797fec0f1875308d720f0b68ba80a89f37a
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 564 Sample.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\GetDXVer\Sample.exe 2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe File created C:\Program Files\GetDXVer\Sample.exe 2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4200 2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe 4200 2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe 4200 2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe 4200 2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe 564 Sample.exe 564 Sample.exe 564 Sample.exe 564 Sample.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4200 wrote to memory of 564 4200 2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe 84 PID 4200 wrote to memory of 564 4200 2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe 84 PID 4200 wrote to memory of 564 4200 2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_5699ef3cee94fdb8bcb6d7b7d44c1759_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Program Files\GetDXVer\Sample.exe"C:\Program Files\GetDXVer\Sample.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:564
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
313KB
MD5b2afd6f90608d1463f5b2dcb35fa3bd1
SHA11cb170337381f433748ecd58072a0132682aa3ec
SHA256b00fc6ce299c12abdde46da0a3488f326a75d5e9fcbbfae9abe277e06a653c0b
SHA5125c99022388679f417fafb52e399db92dadca90a11aa1ef4eb588eca774ad7366198c0241d7b903ea0cbd9e25c427ad76d349021eb4e606f5ec736fab74e86e05